[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144795

 
 

909

 
 

116392

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 116394 Download | Alert*

The com.android.phone process in Android 1.5 CRBxx allows remote attackers to cause a denial of service (application restart and network disconnection) via an SMS message containing a malformed WAP Push message that triggers an ArrayIndexOutOfBoundsException exception, possibly a related issue to CVE-2009-2656.

Adobe Flash Player 10 (32-bit) is installed on the system

Adobe Flash Player 10 (x86) is installed on linux (rpm).

The host is installed with Adobe Reader 10.x before 10.0.1 or 9.x before 9.4.2 or 8.x before 8.2.6 and is prone to denial of service vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploitation may allow attackers to execute arbitrary code

The host is installed with Adobe Reader 9.x through 9.5.3, Adobe Reader or Acrobat 10.x through 10.1.5 or 11.x through 11.0.1 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x through 9.5.3, Adobe Reader or Acrobat 10.x through 10.1.5 or 11.x through 11.0.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSA13-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to APSB13-07. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x through 9.5.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x through 9.5.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    10851    10852    10853    10854    10855    10856    10857    10858    10859    10860    10861    10862    10863    10864    ..   11639

© SecPod Technologies